From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: Received: by sourceware.org (Postfix, from userid 48) id B1BD23858CDA; Wed, 20 Jul 2022 17:59:08 +0000 (GMT) DKIM-Filter: OpenDKIM Filter v2.11.0 sourceware.org B1BD23858CDA From: "segher at gcc dot gnu.org" To: gcc-bugs@gcc.gnu.org Subject: [Bug target/100799] Stackoverflow in optimized code on PPC Date: Wed, 20 Jul 2022 17:59:08 +0000 X-Bugzilla-Reason: CC X-Bugzilla-Type: changed X-Bugzilla-Watch-Reason: None X-Bugzilla-Product: gcc X-Bugzilla-Component: target X-Bugzilla-Version: 10.3.0 X-Bugzilla-Keywords: X-Bugzilla-Severity: normal X-Bugzilla-Who: segher at gcc dot gnu.org X-Bugzilla-Status: ASSIGNED X-Bugzilla-Resolution: X-Bugzilla-Priority: P3 X-Bugzilla-Assigned-To: jskumari at gcc dot gnu.org X-Bugzilla-Target-Milestone: --- X-Bugzilla-Flags: X-Bugzilla-Changed-Fields: Message-ID: In-Reply-To: References: Content-Type: text/plain; charset="UTF-8" Content-Transfer-Encoding: quoted-printable X-Bugzilla-URL: http://gcc.gnu.org/bugzilla/ Auto-Submitted: auto-generated MIME-Version: 1.0 X-BeenThere: gcc-bugs@gcc.gnu.org X-Mailman-Version: 2.1.29 Precedence: list List-Id: Gcc-bugs mailing list List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Wed, 20 Jul 2022 17:59:08 -0000 https://gcc.gnu.org/bugzilla/show_bug.cgi?id=3D100799 --- Comment #13 from Segher Boessenkool --- (In reply to Alexander Grund from comment #11) > Some more experiments with GCC 10.3, OpenBLAS 0.3.15 and FlexiBLAS 3.0.4: >=20 > Baseline: Broken at -O1, working at -Og >=20 > I got it to break with "-Og -fmove-loop-invariants". > Then it worked again by adding "-fstack-protector-all". Both are great info! > But that is > seemingly not advisable: > https://developers.redhat.com/blog/2020/05/22/stack-clash-mitigation-in-g= cc- > part-3 -fstack-protector-strong is cheap enough that you can (and perhaps should) enable it almost always. Some distributions do this even? -fstack-check=3D is an Ada thing. -fstack-clash-protection is a different = thing as well (that's what that article is about). Enabling ssp is not a great workaround of course, it is much to roundabout; and I suspect the only reason it works is because it changes the stack layo= ut. Still, useful info, thanks :-)=